Privacy-preserving encryption scheme using DNA parentage test

نویسندگان

  • Clémentine Gritti
  • Willy Susilo
  • Thomas Plantard
  • Khin Than Win
چکیده

Consider the following practical scenario. Amother Alice would like to make her assets accessible only to her descen-dents. In order to do so, she encrypts her secret Swiss bank account with her DNA sequences, and provides this information to her descendents. To simplify the scenario and without losing generality, we assume that Alice has only one son, named Bob. Therefore, Alice provides the ciphertext to her family (this ciphertext can eventually be published), which will later be stored in a secure cloud storage. Later, when Alice is unable to access her assets herself (due to her illness for instance), then she can ask Bob to use his DNA to conduct a successful decryption. The decryption is successful if and only if Bob is a true descendent of Alice (i.e., Bob passes the DNA parentage test). Furthermore, a third party Charlie will not be able to conduct a successful decryption, even if he colludes with other people who are not Alice’s relatives, since Charlie does not have the required DNA sequences, and hence, he will fail the DNA parentage test. Additionally, Charlie will not learn about anything else other than the unsuccessful decryption process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing

While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...

متن کامل

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Privacy-Enhancing Technologies for Medical Tests Using Genomic Data

We propose privacy-enhancing technologies for medical tests and personalized medicine methods, which utilize patients’ genomic data. Focusing specifically on a typical diseasesusceptibility test, we develop a new architecture (between the patient and the medical unit) and propose a privacy-preserving algorithm by utilizing homomorphic encryption and proxy re-encryption. Assuming the whole genom...

متن کامل

Preserving Privacy of Cloud Data Using Homomorphic Encryption in MapReduce

In recent years, outsourcing large amount of data in cloud and how to manage the data raises many challenges with respect to privacy. The concerns of privacy can be addressed if cloud users encrypt the data deployed in the cloud. Among the various cryptographic encryption schemes, homomorphic scheme allow to perform meaningful computations on encrypted data. In this context, the research deals ...

متن کامل

Privacy Preserving PageRank Algorithm By Using Secure Multi-Party Computation

In this work, we study the problem of privacy preserving computation on PageRank algorithm. The idea is to enforce the secure multi party computation of the algorithm iteratively using homomorphic encryption based on Paillier scheme. In the proposed PageRank computation, a user encrypt its own graph data using asymmetric encryption method, sends the data set into different parties in a privacy-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Theor. Comput. Sci.

دوره 580  شماره 

صفحات  -

تاریخ انتشار 2015